dadevel / mssql-spiderLinks
Automated exploitation of MSSQL servers at scale
☆127Updated last month
Alternatives and similar repositories for mssql-spider
Users that are interested in mssql-spider are comparing it to the libraries listed below
Sorting:
- ☆165Updated last year
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆177Updated 2 years ago
- ACL abuse swiss-knife☆126Updated 2 years ago
- ☆120Updated 9 months ago
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆144Updated last year
- PowerShell Reverse Shell☆79Updated 2 years ago
- ☆197Updated 4 months ago
- Cortex XDR Config Extractor☆135Updated 2 years ago
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆82Updated last year
- A tool for enumerating potential hosts that are open to GSSAPI abuse within Active Directory networks☆181Updated 5 months ago
- Lateral Movement☆125Updated 2 years ago
- ☆75Updated 10 months ago
- Get Fine Grained Password Policy☆77Updated 9 months ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆134Updated 11 months ago
- Lord Of Active Directory - automatic vulnerable active directory on AWS☆147Updated 2 years ago
- Decrypt Veeam database passwords☆219Updated last month
- A Python based ingestor for BloodHound☆85Updated 3 years ago
- A collection of Cobalt Strike Aggressor scripts.☆106Updated 4 years ago
- ☆79Updated 11 months ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆98Updated 2 years ago
- linikatz is a tool to attack AD on UNIX☆153Updated 2 years ago
- ☆94Updated last year
- Collection of random RedTeam scripts.☆211Updated last year
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) SMB shares☆189Updated 2 years ago
- Some scripts to support with importing large datasets into BloodHound☆81Updated 2 years ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆153Updated 2 months ago
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆104Updated 2 years ago
- PowerShell runner for executing malicious payloads in order to bypass Windows Defender.☆72Updated 4 years ago
- Offensive MSSQL toolkit written in Python, based off SQLRecon☆207Updated last year
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆116Updated 6 months ago